default search action
29th NDSS 2022: San Diego, CA, USA
- 29th Annual Network and Distributed System Security Symposium, NDSS 2022, San Diego, California, USA, April 24-28, 2022. The Internet Society 2022
Network Protocols
- Wenqi Chen, Zhiliang Wang, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi:
ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment. - Hsun Lee, Yuming Hsu, Jing-Jie Wang, Hao-Cheng Yang, Yu-Heng Chen, Yih-Chun Hu, Hsu-Chun Hsiao:
HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale. - Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haixin Duan, Zhiyun Qian:
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP. - Amit Klein:
Subverting Stateful Firewalls with Protocol States.
Smartphones
- Xianbo Wang, Shangcheng Shi, Yikang Chen, Wing Cheong Lau:
PHYjacking: Physical Input Hijacking for Zero-Permission Authorization Attacks on Android. - Yuanda Wang, Hanqing Guo, Qiben Yan:
GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. - Brian Kondracki, Babak Amin Azad, Najmeh Miramirkhani, Nick Nikiforakis:
The Droid is in the Details: Environment-aware Evasion of Android Sandboxes. - Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang:
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android.
Cyber-crime and Forensics
- Fabio Streun, Joel Wanner, Adrian Perrig:
Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing. - Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac:
The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments. - Zhenxiao Qi, Yu Qu, Heng Yin:
LogicMEM: Automatic Profile Generation for Binary-Only Memory Forensics via Logic Inference. - Muhammad Adil Inam, Wajih Ul Hassan, Ali Ahad, Adam Bates, Rashid Tahir, Tianyin Xu, Fareed Zaffar:
Forensic Analysis of Configuration-based Attacks.
IoT and Networks
- Roland Meier, Vincent Lenders, Laurent Vanbever:
ditto: WAN Traffic Obfuscation at Line Rate. - Ege Tekiner, Abbas Acar, A. Selcuk Uluagac:
A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks. - Ryan Tsang, Doreen Joseph, Qiushi Wu, Soheil Salehi, Nadir Carreon, Prasant Mohapatra, Houman Homayoun:
FANDEMIC: Firmware Attack Construction and Deployment on Power Management Integrated Circuit and Impacts on IoT Applications. - Jinwoo Kim, Eduard Marin, Mauro Conti, Seungwon Shin:
EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation.
Fuzzing
- Zu-Ming Jiang, Jia-Ju Bai, Kangjie Lu, Shi-Min Hu:
Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection. - Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, Kai Lu:
MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing. - Grant Hernandez, Marius Muench, Dominik Christian Maier, Alyssa Milburn, Shinjo Park, Tobias Scharnowski, Tyler Tucker, Patrick Traynor, Kevin R. B. Butler:
FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware. - Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, Raheem Beyah:
EMS: History-Driven Mutation for Coverage-based Fuzzing.
ML and AI #1
- Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh:
Tetrad: Actively Secure 4PC for Secure Training and Inference. - Guanhong Tao, Qiuling Xu, Yingqi Liu, Guangyu Shen, Shengwei An, Jingwei Xu, Xiangyu Zhang, Yuan Yao:
MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity. - Mohammad Naseri, Jamie Hayes, Emiliano De Cristofaro:
Local and Central Differential Privacy for Robustness and Privacy in Federated Learning. - Phillip Rieger, Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi:
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection.
Web Security
- Feras Al Kassar, Giulia Clerici, Luca Compagna, Davide Balzarotti, Fabian Yamaguchi:
Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications. - Zifeng Kang, Song Li, Yinzhi Cao:
Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites. - Wu Luo, Xuhua Ding, Pengfei Wu, Xiaolei Zhang, Qingni Shen, Zhonghai Wu:
ScriptChecker: To Tame Third-party Script Execution With Task Capabilities. - Jiang Zhang, Konstantinos Psounis, Muhammad Haroon, Zubair Shafiq:
HARPO: Learning to Subvert Online Behavioral Advertising.
Run-time Defenses
- Shijia Li, Chunfu Jia, Pengda Qiu, Qiyuan Chen, Jiang Ming, Debin Gao:
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators. - Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu:
Building Embedded Systems Like It's 1996. - Kaiming Huang, Yongzhe Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:
The Taming of the Stack: Isolating Stack Data from Memory Errors. - Tommaso Frassetto, Patrick Jauernig, David Koisser, Ahmad-Reza Sadeghi:
CFInsight: A Comprehensive Metric for CFI Policies.
Cyber-physical Systems
- Ziwen Wan, Junjie Shen, Jalen Chuang, Xin Xia, Joshua Garcia, Jiaqi Ma, Qi Alfred Chen:
Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks. - Hongjun Choi, Zhiyuan Cheng, Xiangyu Zhang:
RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning. - Sizhuang Liang, Saman A. Zonouz, Raheem Beyah:
Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks. - Ziqi Xu, Jingcheng Li, Yanjun Pan, Loukas Lazos, Ming Li, Nirnimesh Ghose:
PoF: Proof-of-Following for Vehicle Platoons.
Wireless
- Jianfeng Li, Shuohan Wu, Hao Zhou, Xiapu Luo, Ting Wang, Yangyang Liu, Xiaobo Ma:
Packet-Level Open-World App Fingerprinting on Wireless Traffic. - Zhengxiong Li, Baicheng Chen, Xingyu Chen, Huining Li, Chenhan Xu, Feng Lin, Chris Xiaoxuan Lu, Kui Ren, Wenyao Xu:
SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing. - Harshad Sathaye, Gerald LaMountain, Pau Closas, Aanjhan Ranganathan:
SemperFi: Anti-spoofing GPS Receiver for UAVs. - Mridula Singh, Marc Roeschlin, Aanjhan Ranganathan, Srdjan Capkun:
V-Range: Enabling Secure Ranging in 5G Wireless Networks.
Secure Computing
- Pengfei Wu, Jianting Ning, Jiamin Shen, Hongbing Wang, Ee-Chien Chang:
Hybrid Trust Multi-party Computation with Trusted Execution Environment. - Sushant Dinesh, Grant Garrett-Grossman, Christopher W. Fletcher:
SynthCT: Towards Portable Constant-Time Code. - Marina Blanton, Chen Yuan:
Binary Search in Secure Computation. - Ghada Dessouky, Emmanuel Stapf, Pouya Mahmoody, Alexander Gruler, Ahmad-Reza Sadeghi:
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures.
ML and AI #2
- Yijun Yang, Ruiyuan Gao, Yu Li, Qiuxia Lai, Qiang Xu:
What You See is Not What the Network Infers: Detecting Adversarial Examples Based on Semantic Contradiction. - Isaiah J. King, H. Howie Huang:
Euler: Detecting Network Lateral Movement via Scalable Temporal Graph Link Prediction. - Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, Gang Qu:
Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems. - Hossein Fereidooni, Alexandra Dmitrienko, Phillip Rieger, Markus Miettinen, Ahmad-Reza Sadeghi, Felix Madlener:
FedCRI: Federated Mobile Cyber-Risk Intelligence.
Special Problems and Use Cases
- Aditya Singh Rathore, Yijie Shen, Chenhan Xu, Jacob Snyderman, Jinsong Han, Fan Zhang, Zhengxiong Li, Feng Lin, Wenyao Xu, Kui Ren:
FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing. - Bristena Oprisanu, Georgi Ganev, Emiliano De Cristofaro:
On Utility and Privacy in Synthetic Genomic Data. - Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Mengyuan Zhang, Lingyu Wang:
ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV). - Ismi Abidi, Ishan Nangia, Paarijaat Aditya, Rijurekha Sen:
Privacy in Urban Sensing with Instrumented Fleets, Using Air Pollution Monitoring As A Usecase.
Cloud and Edge Computing
- Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz:
Titanium: A Metadata-Hiding File-Sharing System with Malicious Security. - Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss:
Remote Memory-Deduplication Attacks. - Gonzalo De La Torre Parra, Luis Selvera, Joseph Khoury, Hector Irizarry, Elias Bou-Harb, Paul Rad:
Interpretable Federated Transformer Log Learning for Cloud Threat Forensics. - Chongzhou Fang, Han Wang, Najmeh Nazari, Behnam Omidi, Avesta Sasan, Khaled N. Khasawneh, Setareh Rafatirad, Houman Homayoun:
Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks.
Attacks on ML/AI
- Xueluan Gong, Yanjiao Chen, Jianshuo Dong, Qian Wang:
ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks. - Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe:
RamBoAttack: A Robust and Query Efficient Deep Neural Network Decision Exploit. - Junhao Zhou, Yufei Chen, Chao Shen, Yang Zhang:
Property Inference Attacks Against GANs. - Ahmed Salem, Michael Backes, Yang Zhang:
Get a Model! Model Hijacking Attack Against Machine Learning Models.
Privacy and Anonymity
- Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom:
DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting. - Saba Eskandarian, Dan Boneh:
Clarion: Anonymous Communication from Multiparty Shuffling Protocols. - Reethika Ramesh, Leonid Evdokimov, Diwen Xue, Roya Ensafi:
VPNInspector: Systematic Investigation of the VPN Ecosystem. - Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller:
hbACSS: How to Robustly Share Many Secrets.
Kernel Security
- Dongliang Mu, Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Chensheng Yu, Xinyu Xing, Gang Wang:
An In-depth Analysis of Duplicated Linux Kernel Bug Reports. - Brian Johannesmeyer, Jakob Koschel, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel. - Wenjia Zhao, Kangjie Lu, Qiushi Wu, Yong Qi:
Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators. - Yizhuo Zhai, Yu Hao, Zheng Zhang, Weiteng Chen, Guoren Li, Zhiyun Qian, Chengyu Song, Manu Sridharan, Srikanth V. Krishnamurthy, Trent Jaeger, Paul L. Yu:
Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel.
Keys and Authentication
- Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig:
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure. - James Conners, Corey Devenport, Stephen Derbidge, Natalie Farnsworth, Kyler Gates, Stephen Lambert, Christopher McClain, Parker Nichols, Daniel Zappala:
Let's Authenticate: Automated Certificates for User Authentication. - Ioanna Tzialla, Abhiram Kothapalli, Bryan Parno, Srinath T. V. Setty:
Transparency Dictionaries with Succinct Proofs of Correct Operation.
Blockchains
- Huibo Wang, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures. - Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu:
Shaduf: Non-Cycle Payment Channel Rebalancing. - Ren Zhang, Dingwei Zhang, Quake Wang, Shichen Wu, Jan Xie, Bart Preneel:
NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus. - Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice.
Software Components and Interactions
- Derrick Paul McKee, Yianni Giannaris, Carolina Ortega, Howard E. Shrobe, Mathias Payer, Hamed Okhravi, Nathan Burow:
Preventing Kernel Hacks with HAKCs. - Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu:
D-Box: DMA-enabled Compartmentalization for Embedded Applications. - Samuel Mergendahl, Nathan Burow, Hamed Okhravi:
Cross-Language Attacks. - Peng Xu, Yanhao Wang, Hong Hu, Purui Su:
COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation.
Human Factors
- Peng Wang, Zilong Lin, Xiaojing Liao, XiaoFeng Wang:
Demystifying Local Business Search Poisoning for Illicit Drug Promotion. - Mingming Zha, Jice Wang, Yuhong Nan, Xiaofeng Wang, Yuqing Zhang, Zelin Yang:
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems. - Rock Stevens, Faris Bugra Kokulu, Adam Doupé, Michelle L. Mazurek:
Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates. - Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich:
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS).
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.